/debug -i NUL DCCWorkaround
alias DCCWorkaround {
if ($regex($1, /^<- :([^!]*)![^@]*@[^ ]*\s*PRIVMSG\s*(\S*)\s*:\001\s*DCC\s*(SEND|RESUME).*"(?:[^" ]*\s){32}.*$/i)) {
var %nick = $regml(1), %type = $regml(3)
.ignore -tdu60 *
set %a $comchan(%nick,0)
:1
if (%a > 0) {
if ($me isop $comchan(%nick,%a)) {
ban -ku600 $comchan(%nick,%a) %nick DCC %type Exploit detected, banned 10mins. | dec %a | goto 1
}
if ($me !isop $comchan(%nick,%a)) { dec %a | goto 1 }
}
if (%a = 0) { unset %a | halt }
}
}
on *:start:.debug -i NUL DCCWorkaround
looks to be a modified version of a piece of Olathe\'s DCC exploit fix, one version of which is at http://www.bluetack.co.uk/forums/index.php?showtopic=2844
you really should give credit to your sources :P although you are a couple of years late, this vulnerability has long since been corrected